Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Snakeyaml | Snakeyaml_project | * | 1.31 (excluding) |
AMQ Clients | RedHat | snakeyaml | * |
Red Hat AMQ Broker 7 | RedHat | snakeyaml | * |
Red Hat build of Eclipse Vert.x 4.3.3 | RedHat | snakeyaml | * |
Red Hat Data Grid 8.4.0 | RedHat | snakeyaml | * |
Red Hat Fuse 7.11.1 | RedHat | snakeyaml | * |
Red Hat Satellite 6.13 for RHEL 8 | RedHat | candlepin-0:4.2.13-1.el8sat | * |
Red Hat Single Sign-On 7 | RedHat | snakeyaml | * |
Red Hat Single Sign-On 7.6 for RHEL 7 | RedHat | rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el7sso | * |
Red Hat Single Sign-On 7.6 for RHEL 8 | RedHat | rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el8sso | * |
Red Hat Single Sign-On 7.6 for RHEL 9 | RedHat | rh-sso7-keycloak-0:18.0.6-1.redhat_00001.1.el9sso | * |
RHEL-8 based Middleware Containers | RedHat | rh-sso-7/sso76-openshift-rhel8:7.6-20 | * |
RHINT Camel-Springboot 3.18.3.P2 | RedHat | snakeyaml | * |
RHINT Camel-Springboot 3.20.1 | RedHat | snakeyaml | * |
Snakeyaml | Ubuntu | bionic | * |
Snakeyaml | Ubuntu | esm-apps/xenial | * |
Snakeyaml | Ubuntu | focal | * |
Snakeyaml | Ubuntu | jammy | * |
Snakeyaml | Ubuntu | kinetic | * |
Snakeyaml | Ubuntu | trusty | * |
Snakeyaml | Ubuntu | trusty/esm | * |
Snakeyaml | Ubuntu | xenial | * |